The invention discloses cyphometry a cryptographic system comprising ciferglifs, chaotiglyphs and word auras. cyphometry is an esoteric mathematical system that is the direct result of a comparative study of the complex geometric patterns that are formed through specific adding formulas within its fixed number scales between the digits zero (0) and nine (9) used to create ciferglifs, chaotiglyphs and word auras.
13. A computerized cryptographic system called cyphometry, the system comprising:
a computer processor coupled to a memory performing the following steps:
a) providing a cyphometric number scale, said cyphometric number scale having ten digits, each digit being a single integer;
b) establishing the cyphometric number scale horizontally with a space between each of the digits;
c) creating a first subsequent number scale beneath the cyphometric number scale by employing space adding,
wherein the first subsequent number scale includes a series of single digit integers on a horizontal line beneath the cyphometric number scale,
wherein space adding generates a series of single digit integers for the first subsequent number scale,
wherein each of the single digit integers of the first subsequent number scale are positioned beneath each space between integers of the cyphometric number scale above,
wherein each said single digit integer of said first subsequent number scale are generated by adding the two single digit integers on either side of its respective space above and then reducing the total to a single digit integer;
d) forming a cyphometric triangle by creating eight additional number scales, each additional number scale being positioned beneath the number scale from which is was generated, each of these additional eight number scales being created by employing space adding; and
e) forming a word aura derived from said cyphometric triangle.
1. A computerized cryptographic system called cyphometry, the system comprising:
a computer processor coupled to a memory performing the following steps:
a) providing a cyphometric number scale, said cyphometric number scale having ten digits, each digit being a single integer;
b) establishing the cyphometric number scale horizontally with a space between each of the digits;
c) creating a first subsequent number scale beneath the cyphometric number scale by employing space adding,
wherein the first subsequent number scale includes a series of single digit integers on a horizontal line beneath the cyphometric number scale,
wherein space adding generates a series of single digit integers for the first subsequent number scale,
wherein each of the single digit integers of the first subsequent number scale are positioned beneath each space between integers of the cyphometric number scale above,
wherein each said single digit integer of said first subsequent number scale are generated by adding the two single digit integers on either side of its respective space above and then reducing the total to a single digit integer;
d) forming a cyphometric triangle by creating eight additional number scales, each additional number scale being positioned beneath the number scale from which is was generated, each of these additional eight number scales being created by employing space adding; and
e) forming a ciferglif by drawing lines between some of the numbers in said triangle, said ciferglif forming a geometric shape.
8. The system of
10. The process of
11. The system of
12. The system of
|
1. Field of the Invention
The present invention relates generally to cryptographic codes and puzzles and, more specifically, to cyphometry consisting of ciferglifs, chaotiglyphs and word auras.
2. Definition of Terms
Cyphometry is an esoteric mathematical system that is the direct result of a comparative study of the complex geometric patterns that are formed through specific adding formulas within its fixed number scales between the digits zero (0) and nine (9), hereinafter referred to as the cyphometric number scale.
Ciferglifs are created by using a fixed number scale ((cyphometric number scale), All ciferglifs are made up of smaller geometric structures, primarily offset tetrahedrons and triangles. All ciferglifs fit together like a puzzle in form or fashion. Ciferglifs in this way illustrate geometrically the concept of connectivity much like letter within the English alphabet. Example: the letters “L” and “F” can be found within the letter “E”.
Cyphometry is an esoteric mathematical system that is the direct result of a comparative study of the complex geometric patterns that are formed through specific adding formulas within its fixed number scales. Cyphometry presents a unique theoretical and mystical insight as to how the secrets and relationships between the digits zero (0) and nine (9) in correlation with the other numbers relate to nature and to the human psyche.
Cyphometry also contains a built-in secret writing/mutative code system that is based on a set key and/or predetermined rules that apply an abstract methodology to the three basic forms of written/oral communication; numbers, letters, and symbolism.
The cyphometric number scale (CNS) and space adding are used to create ciferglifs. Space adding utilizes the sum of the adjacent numbers and the resulting sum is placed centrally below. Space adding is repeated continuously until a single digit is present. Once all the space adding is complete, a cyphometric triangle is formed. Cyphometric numbering will always be a single digit. When the sum of two numbers is equal or greater than 10, the numbers of the sum are then added together to create a new single digit sum.
Examples Single Digit
Examples Extreme
Adding
Opposites of 0/9:
5 + 6 = 11 then 1 + 1 = 2
0 + 2 = 2
6 + 7 = 13 then 1 + 3 = 4
9 + 2 = 11 then 1 + 1 = 2
7 + 8 = 15 then 1 + 5 = 6
0 × 2 = 0
8 + 9 = 17 then 1 + 7 = 8
9 × 2 = 18 then 1 + 8 = 9
When a cyphometric triangle is formed using the cyphometric number scale, the second run of numbers below the CNS represent odd numbers on the left side and even numbers are represented on the right side. In cyphometry, zero (0) and nine (9) are opposites to their extremes. Zero (0) represents nothing or un-created energy, and nine (9) represents everything or all created energy/future (the highest number of any sequence). As light and dark have the same effect at their extremes (not able to see), zero (0) and nine (9) have the same effect, except numerically. In turn, nine (9) can act as a zero (0) and zero (0) can act as a nine (9) in defining cyphometry.
The cyphometric number scale may be oriented in many ways. Such forms include horizontal, vertical, and or angled. When space adding is applied to the cyphometric number scale in any length boundary, cyphometric triangle(s) will manifest itself. As a result cyphometric triangles may intersect one another, as with chaosometric triangles.
There are six adding formulas that are used to create a cyphometric number scale and a word aura spine. The six forms are; standard, mirrored, adverse active, opposite, adverse reactive, and past pathed. Each adding formula is unique, but all forms consist of the ten single digits (0-9) that are used only once in any cyphometric number scale.
Adding Formula for (CNS) and Word Aura Spine
Standard
STD
0
1
2
3
4
5
6
7
8
9
Mirrored
MRD
0
2
4
6
8
1
3
5
7
9
Adverse
AD-A
0
4
8
3
7
2
6
1
5
9
Active
Opposite
OPP
0
8
7
6
5
4
3
2
1
9
Adverse
AD-R
0
7
5
3
1
8
6
4
2
9
Reactive
Past Pathed
PSP
0
5
1
6
2
7
3
8
4
9
When working with either, the math is the same, any two numbers that are added together are, if necessary, reduced to a single digit. That sum is described in standard 1st form which is also the cyphometric number scale (0 thru 9). To identify the value of a number in another form, the intersection of the column and row is used. Example: 4+3=7. To find the adverse-reactive equivalent to 4+3, go to the column of the 1st form sum (7), move down the column until the adverse-reactive (5th form) row is reached at the left. The resulting adverse-reactive value of 4+3 is equal to 4. Each code form is a cyphometric number scale because they begin with 0/9 and/or end with 0/9. The numbers between are opposites at both ends of the scale at any given point.
The six adding formulas that are used to create a cyphometric number scale and a word aura spine is also used create numeric wave lengths. Numeric wave lengths are created by connecting like numbers. Like ciferglifs, the formed numeric wave lengths are opposites.
The code forms for word auras and ciferglifs are within the cyphometric triangle. By spaced adding the numbers of each row in the same single digit format, each of the first six rows depict a single repetitive digit that is in turn used to identify the code form. Note: the repeat digit is represented in each of the code forms in the same position within the cyphometric triangle.
All ciferglifs as well as chaotiglyphs are made up of smaller geometric structures, primarily offset tetrahedrons and triangles. Each cyphometric triangle and chaosometric triangles will vary depending on the adding formula it's in. Additionally, there are three methods of lining numbers within a cyphometric triangle. These methods include; based lining, scaled lining and selected lining.
In based lining, of the six equivalent digits, a line is drawn from each of the five digits to the same digit within the cyphometric number scale.
In scaled lining, of the six equivalent digits, a line is drawn from each to a like number resulting in five lines starting from a given digit.
In selected lining, of the six equivalent digits, the user selects a quantity less than six to interconnect (if 4 of the 6 were selected, each of the four digits would have three lines starting from a given digit.)
All ciferglifs fit together like a puzzle in form or fashion. Ciferglifs in this way illustrate geometrically the concept of connectivity much like letter within the English alphabet. Example: the letters “L” and “F” can be found within the letter “E”.
We have established that ciferglifs are created by using a fixed number scale ((cyphometric number scale), chaotiglyphs on the other hand, utilize a chaosometric number scale. A chaosometric number scale does not utilize the number (0) and must end with the number it began the sequence with. The same side adding principals apply in creating the chaosometric triangle. Depending on the form of a chaosometric triangle is in, chaotiglyphs can create ciferglifs by using different numbers and are generally angled and can even be upside down.
The present invention, word auras are an abstract esoteric art form that utilize the three basic forms of written communication, numbers, letters and symbols. Any word in any written language can be given a numerical value and that number value can be translated into a geometric design or symbol. Taking a word and translating it into a number then transforming that number into a symbol. It is a kind of systematic fusion between mysticism and science, the impractical with the practical. Also word auras are a code system that can mutate like a virus, without changing its structure.
Word auras: are the only esoteric art in the world that combines the three basic forms of written communication, numbers, letters and symbols to form complex geometric designs derived from the numerical values given to the letters of words. The word code depicted below is the preferred arrangement of letters of the alphabet; other arrangements may be defined to create different codes and would result in different shaped word auras.
Word Code for English
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
1
2
3
4
5
6
7
8
9
Using the word “good” as an example for a word (standard form) aura: the word “good” “g” is the 7th letter of the English alphabet, therefore “G” is 7. “0” is the 15th letter and must be reduced to a single digit 1+5=6, “D” is the fourth letter. Hence, GOOD is equal to 7664.
Disks are points that can be shared by any number and it's opposite and is centrally located between said numbers. In creating a numeric structure, a line may be drawn to the disk in lieu of the number.
Code forms relationships are derived between cyphometric number scale and both the far right and far left of the cyphometric triangle. In such, a quantitative value of itself spaced added will result in the last number of the far left or right row of the cyphometric triangle.
Binding opposites are used to create platonic solids. All ciferglifs can connect to each other in some fashion and lines can be added to the numbers that are not connected as long as they are opposites (1 & 8) (2 & 7) (3 & 6) or (4 & 5). This connection is called binding. In turn, binding of opposites are utilized to create platonic solids such as a cube, tetrahedron, or octahedron.
Cyphometry is a non-conventional geometry, however, one can create many practical applications such as periodic tiling in an abstract way. A cyphometric number scale ordered in the same fashion as with cell numbers in word auras will create periodic tiling. Using ¼ of the full structure and select lining by using only the structures made by 3 and 6, one can create a simple form of periodic tiling.
Description of the Prior Art
There are other cryptographic codes and puzzles. Typical of these is U.S. Pat. No. 1,136,875 issued to Herbern on Apr. 20, 1915.
Another patent was issued to Hoffman on Oct. 23, 1934 as U.S. Pat. No. 1,978,107. Yet another U.S. Pat. No. 3,995,254 was issued to Rosenbaum on Nov. 30, 1076 and still yet another was issued on Sep. 2, 1986 to Blum as U.S. Pat. No. 4,610,025.
Another patent was issued to Johnson on Jan. 9, 1990 as U.S. Pat. No. 4,892,319. Yet another U.S. Pat. No. 5,128,525 was issued to Stearns on Jul. 7, 1992. Another was issued to Opstad on May 16, 1995 as U.S. Pat. No. 5,416,898 and still yet another was issued on Dec. 26, 1995 to Rehm as U.S. Pat. No. 5,479,506.
Another U.S. patent was issued to McConnell et al. on Jun. 11, 1996 as U.S. Pat. No. 5,526,477. Yet U.S. Pat. No. 6,457,651 was issued to Paul on Oct. 1, 2002. Another was filed by Sabin on Jun. 10, 2003 as U.S. Pat. No. 6,575,756. Still yet another was filed by Hilton on Mar. 29, 2005 as U.S. Pat. No. 6,871,789. Internationally, a U.K. Patent was issued to Jaggard on Oct. 20, 1937 as GB474,026
Invention provided new and useful Improvements in Cryptographic Code Cards, of which the following is a specification. The object of the present invention is to provide: a compact and readily changeable cryptographic code device.
This invention relates to improvements in games. It is one of the objects of this invention to provide an improved game which is adapted for the entertainment of, both young and old, and which may be played in a number of different manners by two or more persons. A more specific object of this invention is to provide a game utilizing a belt bearing a plurality of characters, the said belt being movable within a casing having a plurality of, normally closed windows, and said characters on the belt being adapted to register with said windows so that if a predetermined character is stopped at a selected window the person who has selected said window will gain an ad-vantage in the game.
This invention relates to games or puzzles of the matched pattern type. One; object of the invention is to provide in a game or puzzle of this—kind a board or ground upon which is delineated a base pattern, ‘scheme’ or puzzle lay-out to be matched or reconstructed, and a plurality of “men” or, play pieces for correctly laying; over the base pattern, each “man” or piece bearing digits, figures, letters, characters, indicia or markings corresponding or answering to or indicating that portion of the base pattern immediately underlying the said “man” or play piece as correctly placed, whereby through’ the correct placing of the play pieces upon the underlying pattern, side’ by side, end to end or end to side, the said base pattern or puzzle lay-out will be reproduced or represented or, reconstructed upon the combined upper; surfaces of the said “men” or play pieces.
A digital reference matrix apparatus is disclosed for verifying input alpha words from a keyboard, character recognition machine, or voice analyzer as valid linguistic expressions. The organization of the digital reference matrix is based upon the character transfer function of the input apparatus. The digital reference matrix contains a vector representation for each dictionary word in the form of a calculated vector magnitude and unique vector angle. The set of magnitudes and angles is stored in the digital reference matrix using a form of run length coding by storing a single magnitude pointer followed by the chain of unique angles for words having the same magnitude. The vector magnitude so calculated constitutes the address data for accessing the digital reference matrix. When an input word is received for verification, the word's magnitude and angle attributes are calculated and the digital reference matrix is accessed at the magnitude of the input word and the corresponding angles are searched for a match. An output signal is generated indicating whether or not the input word is valid. The organization of the digital reference matrix minimizes the size of the array needed for accurate word verification representation through the use of the combination of digital angle representation and run length compaction of the magnitude/angle verification syntax.
A system for recognizing the content of a communication in symbolic language and composed of plural glyphs arranged in a predetermined order, each glyph being the smallest (lowest) informational unit of the language. The system includes a device for inputting a stream of data indicative of the plural glyphs, such as formed in a page of text. That stream is input into a storage means. The stored data is horizontally segmented into discrete lines of text and is then vertically segmented into individual glyphs. Each individual glyph is assigned a unique identifier, whereby all substantially identical glyphs are represented by the same identifier. The identifiers are arranged in a sequence corresponding to the sequence in which the glyphs appeared in the communication, thus representing glyph “words”. The system then applies decryption routines which include general cryptographic techniques to the identifiers, their sequences and their interrelationships to determine the equivalent symbol of language corresponding to each identifier. Once the symbol of language corresponding to each identifier has been determined, the machine code equivalent (i.e., code capable of being “understood” and utilized by an electronic computer) is substituted for each identifier, so as to provide a machine readable code representation of the communication, e.g., page of text.
An apparatus for a word game is disclosed. A game board surface is divided into a number of squares into which playing pieces containing the letters of the alphabet are placed to complete a word. The various words are contained in groups which, when of a certain size, are considered to be an ISLAND which creates the right to start a new word independent from all the other which is an ATOLL. Except for ATOLLS and the beginning of the game, any new letters added must form a word with those letters already on the playing field. New words which link one ISLAND to another ISLAND or ATOLL are ISTHMUSES and capture the ISLAND or ATOLL to which they are linked as part of the territory for the player creating such an ISTHMUS. Two iscosahedron dice having their faces numbered from 1 to 20 are used to randomly select numbers from 2 to 40. These numbers are related to the letters of the alphabet by a decoder with the frequency of number approximating the frequency of the use of the letters in making words. The seldom used letters of the alphabet are increased through the use of a number of bonus letters and the value of the individual letters vary based on a scoring code. The individual ownership of ATOLLS, ISTHMUSES and ISLANDS is shown by a color-coded transparent flag placed on top of one of the previously played letters.
Weighted and unweighted convolution filtering processes are provided for decoding bitmap image space representations of self-clocking glyph shape codes and for tracking the number and locations of the ambiguities or “errors” that are encountered during the decoding. This error detection may be linked to or compared against the error statistics from an alternative decoding process, such as the binary image processing techniques that are described herein to increase the reliability of the decoding that is obtained.
A computer system for rendering text is provided. A keyboard is used to enter characters into the computer system. A character code corresponding to each entered character is generated. A particular font is chosen from a font table stored in memory. The font table contains a number of different fonts, with each font having a number of glyph indexes corresponding to a number of different glyphs. A character can have a plurality of different glyph indexes for a particular font. A processor maps the character code to a glyph index according to the selected font and later processes the glyph index. The glyph corresponding to the processed glyph index is then displayed.
A game apparatus including a puzzle and a conforming device. The puzzle includes ciphertext indicia and a number of designated spaces corresponding with the ciphertext for displaying a developing solution. The ciphertext is a message encrypted according to some substitutional and/or transpositional encipherment scheme. At each stage of solving, the ciphertext and developing solution show what has been correctly solved and what remains to be solved. The conforming device verifies the correctness of correct guesses and corrects incorrect guesses without prejudicing future guesses. There are manifold types of messages, encipherment schemes, developing solutions and conforming devices. Some puzzles and conforming devices are made by a computerized method. The game can be played by one player or several players in competition. It can be played using a game board or other apparatus or by using a computer with an interactive computer program. To solve a puzzle, a puzzle solver first forms a guess-pair. Typically, a guess-pair is a plain character and a cipher character that could be the plain character's substitute. The conforming device is used to verify the correctness of the guess-pair, or if it is wrong, to obtain a correction. The verified or corrected guess-pair is then used to update the developing solution. These three steps are repeated at least once. There are various scoring rules for various versions of the game.
A method and apparatus for generating glyphs for text elements input to a computer having a memory with at least one look-up table storing glyphs corresponding to such text elements. Each text element is made up of at least one code point, and often of several code points. The system searches the table for a glyph representing an input text element, and if it is not found methodically generates subsets of the text element and searches the table for glyphs representing each of the subsets. Default characters are generated for code points not represented in the table. The system uses a classification for each code point, such as the Unicode classifications, and handles unknown code points in a manner dependent upon their classification. Where a text element includes two characters with an intermediate joining character, and the text element as a whole is not represented in the table, the two characters are output for rendering separately. Where a text element includes combining characters and the combined text element as whole is not represented in the table, the system generates the characters separately and then combines them for rendering as a single glyph. Unknown combining characters are replaced by a code point for a blank combining character, for allowing any surrounding combining characters to be rendered in a combined fashion.
A dual level encryption method, and document, for providing and obtaining a substantially increased amount of optically readable information from an otherwise conventional and highly visible printed bar code pattern area on a document without interfering with the conventional optical reading of the conventional information in the bar code, comprising integrally printing a second and very much finer pattern of encoded optically machine readable glyph code or other such indicia within the bar code pattern area, containing a much higher level of information, to provide two different levels of information within the same area. Scanning the bar code pattern with a conventional bar code reader extracts conventional bar coded information embedded in the bar code without interference from the second indicia. Scanning the same bar code pattern area with a different, higher resolution, optical scanner extracts the much greater amount of information from the second, much finer, optically readable indicia pattern.
A set of blocks used as an aid for teaching mathematical concepts, in which blocks of different sizes are provided with characteristic dimensions that bear a relationship to preselected numbers in the Fibonacci series. The Fibonacci series is defined as an infinite sequence of numbers starting with 1 that builds by adding the present number to the prior number to form the next number in the series. The first part of the series progresses: 1, 1, 2, 3, 5, 8. 13, 21, 34, 55, . . . , with 0 being understood as the number prior to 1. The series is related to the Golden Ratio of approximately 1:1.618, a ratio found in nature and in certain works of art, by the ratio of adjacent numbers, after thirteen, in the series. The blocks can be used to teach students mathematical concepts such as pattern recognition, the Fibonacci series and related Golden Ratio, and the interrelations between mathematics and other disciplines such as biology, botany, and architecture.
A document is printed with graphical symbols which encode information but are not human readable; the graphical symbols are formed into some or all of visible element printed on the document. The outline of this element is used for synchronising an automated process for scanning the document to extract the encoded information from the element. In prior art systems, synchronising an automated process for scanning the document to extract the encoded information from the element requires large scale arrangement of the graphical symbols (e.g. a horizontal line of glyphs which are all forward facing and which intersect a vertical line of glyphs which are all rearward facing). This considerably mars the appearance of a printed document. This negative impact on appearance has been one of the major causes inhibiting the uptake of graphical symbol technology for encoding information.
Puzzles are formed by selecting pieces from a set of ninety-six four-sided pieces of the same shape and size, the edges of the pieces being marked in order with the following sets of four numerals or corresponding numerals or corresponding other distinguishing marks, 1234, 1238, 1247, 1278, 1346, 1368, 1467, 1678, 5234, 5238, 5247, 5278, 5346, 5368, 5467, 5678, each set being arranged in all possible orders to give ninety-six differently marked pieces. The pieces may be square, diamond or oblong shape. The numerals may be replaced by corresponding numerals, light and dark colours, or combinations thereof, objects, pips (as on dominoes), letters, or upright and inverted words.
While these cryptographic codes and puzzles may be suitable for the purposes for which they were designed, they would not be as suitable for the purposes of the present invention, as hereinafter described.
A primary object of the present invention is to provide cyphometry consisting of ciferglifs, chaotiglyphs and word auras/glyph art.
Another object of the present invention is to provide an esoteric system of secret writing based on a set key, or predetermined rules and/or codes and geometry.
Yet another object of the present invention is to provide an esoteric system of secret writing based on the cyphometric number scale.
Still yet another object of the present invention is to provide an esoteric system of secret writing based on the cyphometric number scale and space adding used to create ciferglifs.
Another object of the present invention is to provide a cyphometric number scale that may be oriented in many ways as long as the scale begins with (0/9) and ends in (0/9). Such forms include horizontal, vertical, and or angled.
Yet another object of the present invention is to provide an esoteric system of secret writing utilizing methods of lining numbers used to create ciferglifs.
Still yet another object of the present invention is to provide an esoteric system of secret writing utilizing a based lining method used to create ciferglifs.
Still yet another object of the present invention is to provide an esoteric system of secret writing utilizing a scaled lining method used to create ciferglifs.
Another object of the present invention is to provide an esoteric system of secret writing utilizing a scaled selected method used to create ciferglifs.
Yet another object of the present invention is to provide an esoteric system of secret writing based on the cyphometric number scale number scale and space adding used to create chaotiglyphs.
Additional objects of the present invention will appear as the description proceeds.
The present invention overcomes the shortcomings of the prior art by providing an esoteric system of secret writing based on a set key, or predetermined rules and/or codes and geometry based on cyphometry consisting of ciferglifs, chaotiglyphs and word auras.
The foregoing and other objects and advantages will appear from the description to follow. In the description reference is made to the accompanying drawings, which forms a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments will be described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that structural changes may be made without departing from the scope of the invention. In the accompanying drawings, like reference characters designate the same or similar parts throughout the several views.
The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is best defined by the appended claims.
In order that the invention may be more fully understood, it will now be described, by way of example, with reference to the accompanying drawing in which:
With regard to reference numerals used, the following numbering is used throughout the drawings.
The following discussion describes in detail one embodiment of the invention (and several variations of that embodiment). This discussion should not be construed, however, as limiting the invention to those particular embodiments, practitioners skilled in the art will recognize numerous other embodiments as well. For definition of the complete scope of the invention, the reader is directed to appended claims.
While certain novel features of this invention have been shown and described and are pointed out in the annexed claims, the invention is not intended to be limited to the details above, since it will be understood that various omissions, modifications, substitutions and changes in the forms and details of the device illustrated and its operation can be made by those skilled in the art without departing in any way from the spirit of the present invention.
Without further analysis, the foregoing will so fully reveal the gist of the present invention that others can, by applying current knowledge, readily adapt it for various applications without omitting features that fairly constitute essential characteristics of the generic or specific aspects of this invention.
Zajac, Edward J, Goris, Robert
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
1136875, | |||
1874930, | |||
1978107, | |||
3995254, | Jul 16 1975 | International Business Machines Corporation | Digital reference matrix for word verification |
4610025, | Jun 22 1984 | ASSOCIATED INVESTMENT COMPANY VENTURES, INC , 5801 TROWBRIDGE, EL PASO, TEXAS 79925 A TEXAS CORP | Cryptographic analysis system |
4892319, | Jul 20 1988 | Word game | |
5128525, | Jul 31 1990 | XEROX CORPORATION, STAMFORD, CT A CORP OF NY | Convolution filtering for decoding self-clocking glyph shape codes |
5416898, | May 12 1992 | Apple Inc | Apparatus and method for generating textual lines layouts |
5479506, | Jul 13 1989 | Cryptographic guessing game | |
5526477, | Jan 04 1994 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for generating glyphs of unknown characters |
6457651, | Oct 01 1999 | Xerox Corporation | Dual mode, dual information, document bar coding and reading system |
6575756, | Feb 11 2000 | Mathematical teaching apparatus | |
6871789, | Feb 09 2001 | FISERV CIR, INC | Document printed with graphical symbols which encode information |
20060126829, | |||
GB474026, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Date | Maintenance Fee Events |
Sep 27 2013 | STOM: Pat Hldr Claims Micro Ent Stat. |
May 26 2017 | REM: Maintenance Fee Reminder Mailed. |
Nov 13 2017 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Oct 15 2016 | 4 years fee payment window open |
Apr 15 2017 | 6 months grace period start (w surcharge) |
Oct 15 2017 | patent expiry (for year 4) |
Oct 15 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 15 2020 | 8 years fee payment window open |
Apr 15 2021 | 6 months grace period start (w surcharge) |
Oct 15 2021 | patent expiry (for year 8) |
Oct 15 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 15 2024 | 12 years fee payment window open |
Apr 15 2025 | 6 months grace period start (w surcharge) |
Oct 15 2025 | patent expiry (for year 12) |
Oct 15 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |